Patent classifications
G07C2009/00873
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.
Credential updates in an offline system
A method according to one embodiment includes receiving, by an access control device, access control data from a server, storing the received access control data to a no tour database stored in a memory of the access control device, determining a credential device has been presented to a credential reader associated with the access control device, and transmitting the stored access control data to the credential device in response to determining the credential device has been presented to the credential reader and prior to communication with the server.
CREDENTIAL UPDATES IN AN OFFLINE SYSTEM
A method according to one embodiment includes receiving, by an access control device, access control data from a server, storing the received access control data to a no tour database stored in a memory of the access control device, determining a credential device has been presented to a credential reader associated with the access control device, and transmitting the stored access control data to the credential device in response to determining the credential device has been presented to the credential reader and prior to communication with the server.
SECURITY SYSTEM FOR A MOVEABLE BARRIER OPERATOR
In one aspect, a movable barrier operator is provided having a motor, a transmitter, a receiver, and a controller. The controller is configured to receive through the receiver a first public key from a remote control; determine a second public key and a second private key; and determine a shared secret session key using the second private key and the first public key. The controller is configured to operate the transmitter and receiver to bidirectionally communicate with the remote control so that the movable barrier operator can learn a fixed code and a changing code of the remote control. The bidirectional communications are encrypted using the shared secret session key. Upon the movable barrier operator successfully learning the remote control, the movable barrier operator transmits a long-term key to the remote control that is used to encrypt subsequent communications between the movable barrier operator and the remote control.
Reader coordination for access control
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Credential updates in an offline system
A method according to one embodiment includes receiving, by an access control device, access control data from a server, storing the received access control data to a no tour database stored in a memory of the access control device, determining a credential device has been presented to a credential reader associated with the access control device, and transmitting the stored access control data to the credential device in response to determining the credential device has been presented to the credential reader and prior to communication with the server.
CONTROLLING ACCESS TO AN ACCESS OBJECT
It is presented a method for controlling access to an access object. The method is performed in an access control device and comprises the steps of: receiving a user input to reset the access control device; generating a new identifier for the access control device, and discarding any previously used identifier for the access control device; communicating with an electronic key to obtain an identity of the electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a receiver; and granting access to the access object only when the plurality of delegations comprise a sequence of delegations covering a delegation path from the access control device, identified using the new identifier,to the electronic key such that, in the sequence of delegations, the delegator of the first delegation is the access control device, and the receiver of the last delegation is the electronic key.
ELECTRONIC LOCK AND RELATIVE OPERATION METHOD
A programmable electronic lock (1) comprising at least one electronic key (10) engageable in an electronic lock (1) and configured to allow the opening and/or closing of a shutter (100) by means of too a security code; a containment body (20) which can be mounted on the shutter (100); a block (30), which includes reversible locking/unlocking means (32) able to be electrically actuated and configured to determine a clamping condition or a disengagement condition. The electronic lock (1) comprises reversible locking/unlocking means (32) having a shaped element (32a) rotatable so as to determine, in a first position, a mechanical interference between the block (30) and the containment body (20), so as to prevent a relative movement therebetween, and, in a second position, a condition of no mechanical interference between the block (30) and the containment body (20), so as to allow a relative movement between said block (30) and the containment body (20).
CREDENTIAL UPDATES IN AN OFFLINE SYSTEM
A method according to one embodiment includes receiving, by an access control device, access control data from a server, storing the received access control data to a no tour database stored in a memory of the access control device, determining a credential device has been presented to a credential reader associated with the access control device, and transmitting the stored access control data to the credential device in response to determining the credential device has been presented to the credential reader and prior to communication with the server.
METHOD AND SYSTEM FOR SWITCHING THE PREMISES
Aspects of the invention are directed towards systems and methods for changing the premises in a building such as hotel or the like. A user sends to a request from a user device to a server for switching a first premises with the second premises. An access card is able to access the first premises. Based on the request, the server determines the second premises and generates access credentials for the second premises. The access credentials are transmitted to a first access terminal associated with the first premises and the access card is encoded with the access credentials to access the second premises and permitting entry inside the second premises.